13 13th
th Dec 2018
Cyber Security support to the HumanDrive Project
Luigi i Bisbig iglia SBD Autom
- mot
- tive
Cyber Security support to the HumanDrive Project th Dec 2018 13 th - - PowerPoint PPT Presentation
Cyber Security support to the HumanDrive Project th Dec 2018 13 th 13 SBD Autom omot otive ve Ltd Busin iness Develo lopm pment nt Manager Luigi i Bisbig iglia Grand Drive will be an end -to-end journey of around 200 miles
th Dec 2018
Autumn
requirements and design reviews
results, remediation and risk rating)
Intelligence Strategy Evaluation
SAE Levels Key in-car architecture characteristics
Level 0 “Legacy architecture”
Level 1 “Carry-over architecture”
Level 2 “Primitive ADAS architecture”
Level 3 “Semi autonomous architecture”
Level 4 “Full autonomous architecture”
Level 5 “Driverless architecture”
STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service and Elevation of Privilege) is a threat modelling approach developed by Microsoft and it is currently considered the most applicable method for the automotive industry because it:
S
Spoofing User Identity
T
Tampering with Data
R
Repudiation
I
Information Disclosure
D
Denial of Service
E
Elevation of Privilege
Attempt to gain access to a system by using a false identity Ability of users to deny that they performed specific actions Process of making a system unavailable to legitimate users Unauthorised modification
Unwanted exposure of data
User with limited privileges gains access to restricted application User with limited privileges gains access to restricted application
Hactivists Cyber Criminal Disgruntled ex- employees State Hackers Script Kiddies Spy Hackers Make Political Statements Financial gain, Cyber Warfare Revenge Espionage Fun and Fame, Avoid paying Corporate Espionage
different.
Case # Actor I Want So That 1 Bitcoin Miner Use ability of ECUs Get more bitcoin 2 Academic Researcher/Cyber Criminal Spoof the system Get private information from vehicle 3 Service Provider Patch the vehicle but ignore some of them Have this customer back and get more money 4 Vehicle Owner Block the entrance parking Annoy my neighbours 5 Vehicle Owner Cheat after cars into giving ways He can drive faster 6 Professional Hacker Hack into the car Ransom it to their owners 7 Competitor Cause delays(jam) in some roads Gain advantage/value 8 Criminal Follow another vehicle Do criminal activities 9 Criminal Other CAV crash into my own Get money 10 Criminal Use Autonomous Car Transport illicit goods 11 Terrorist Use Autonomous Car Damage traffic 12 Professional Hacker Spoof signs Change vehicle behaviour 13 OCA (Organise Crime Agent) Data mining - sell products on web Can get profit 14 OEM Gather data to sell Get money 15 Competitor Develop new exciting products Seize the market 16 Pranker Direct traffic Make giggles 17 OEM Highlight deficiencies in system Gan greater market sharing 18 Attacker/Terrorist Remotely control cars Commit a terrorist attack 19 Professional Hacker Control the vehicle Do the DDoS attack to others
capturing high-level system functional requirements. The user stories are generated by the system stakeholders.
stories captured for malicious Actors can help in identifying potential system misuse or exploitation, at a high level.
Actors can help in identifying the functions that need protecting and the required interactions between the intended Actors.